What is the difference between a user agent (UA) and a mail transfer agent (MTA)?

1 Answer

Answer :

The UA prepares the message, creates the envelope, and puts the message in the envelope. The  MTA transfers the mail across the Internet.

Related questions

Description : A machine that connects to two or more electronic mail systems and transfers mail messagesamong them is known as A. Gateways B. mail gateway C. bridges D. User Agent E. None of the above

Last Answer : mail gateway

Description : Which phase/s of POP3 allow/s an user agent to retrieve the messages as well as to mark the messages for deletion purpose? a. Authorization Phase b. Transaction Phase c. Update Phase d. All of the above

Last Answer : b. Transaction Phase

Description : Which among the below specified illustrations belongs to the category of GUI based user agents? a. mail b. pine c. Outlook & Netscape d. All of the above

Last Answer : c. Outlook & Netscape

Description : Which among the below specified illustrations belongs to the category of GUI based user agents? A. mail B. pine C. Outlook D. All of the above

Last Answer : C. Outlook

Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above

Last Answer : Layer 7 protocols

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : b. content-transfer-encoding

Description : Which intermediaries are more likely to get involved during the transfer function of an e-mail system? a. Storage and forwarding of e-mail for certain addresses b. Act as gateways to other e-mail or messaging systems c. Both a & b d. None of the above

Last Answer : c. Both a & b

Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above

Last Answer : d. All of the above

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : Which is a time-sensitive service? A. File transfer B. File download C. E-mail D. Internet telephony

Last Answer : D. Internet telephony

Description : Has anyone ever used one of those cleansing kits you use if you have to take a UA, but you've been smoking, and you want to pass?

Last Answer : answer:Is there a way to find out if you’ve used a cleanser? Yes. Will I tell you what it is? Nope. My advice: Stop taking drugs.

Description : Has anybody had a bad experience with UA, United Airlines?

Last Answer : I feel your pain. I travel a lot and they are the worst. AA is just as bad. Its like a giant fast food resturant in the sky. Crappy service, crappy food and bitchy employes.

Description : What is 2.0 UROBILINOGEN UA results?

Last Answer : What if your UROBILINOGEN, UA is 2.0?

Description : What type of transmission fluid is recommended for 2005 Nissan wingroad ua-wfy11?

Last Answer : Need answer

Description : What about golden seal can it help me pass ua?

Last Answer : It prevents drugs from being stored in urinary tract passages, resulting in increasing the rate of excretion of both marijuana and metabolites, which causes urine tests to show negative

Description : Does the San Francisco MTA have the right to ticket you twice for the same offense within 10 minutes?

Last Answer : they have the right to ticket you for whatever they wish. Just like you have the right to go to court and get it thrown out

Description : Should Bloomberg's MTA reform plan include climate control for stations.

Last Answer : Depends if you believe in global warming i suppose. Most city MT authorities are so hard in debt I would come to the same conclusion as you. Take the AC/Heat while the prices are still relatively cheap.

Description : What is the full form of 'MTA' ? -How To ?

Last Answer : The full form of 'MTA' is Master of Tourism Administration

Description : Qualifying For MTA Cleaning Jobs?

Last Answer : The Metropolitan Transportation Authority (MTA) is responsible for all of the public transportation systems in New York City and a small area beyond. MTA cleaning jobs are also known as ... benefits packages and the opportunity to earn a pension that can pay out regularly after retirement.

Description : MTA Cleaning Jobs?

Last Answer : The Metro Transit Authority (MTA) employs thousands of New York residents in a variety of positions. Those employed by MTA enjoy good pay and benefits, and many job classifications are available for qualified applicants ... buses is a great for those new to the job force to get a foot in the door.

Description : What Is Remote Mount With Mta Option? (in Case Of Dual Sensor Vortex Flowmeter, Rosemount Has Written In Its Catalog Drawings)?

Last Answer : Remote mount with MTA means MTA connector for mounting remote connection. MTA is the Connector used for connection. Generally we called it MTA Connector. There are many types of MTA connector such as MTA 100connectors, Mta 156 connectors etc.

Description : The purpose of MTA is  A) Message preparation B) Storing messages C) Transferal of messages across the Internet D) All of the above

Last Answer : The purpose of MTA is Message preparation, Storing messages, Transferal of messages across the Internet

Description : Information hiding is to hide from user, details ? that are relevant to him that are not relevant to him that may be maliciously handled by him that are confidential

Last Answer : that may be maliciously handled by him

Description : Milestones are used to ? Know the cost of the project Know the status of the project Know the user expectations None of the above

Last Answer : Know the cost of the project

Description : Which statement is true regarding the user exec and privileged exec mode? A. They both require the enable password B. User exec is a subset of the privileged exec C. The '?' only works in Privileged exec D. They are identica

Last Answer : User exec is a subset of the privileged exec

Description : User programmable terminals that combine VDT hardware with built-in microprocessor is a. Kips b. PC c. Mainframe d. Intelligent terminals

Last Answer : Intelligent terminals

Description : Which statement is valid about computer program? a. It is understood by a computer b. It is understood by programmer c. It is understood user d. Both of above

Last Answer : Both of above

Description : Report generatorsare usedto A. store data input bya user B. retrieve information from files C. answer queries D. both (b)and (c) E. None of the above

Last Answer : both (b)and (c)

Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above

Last Answer : Security

Description : A front-end processor is A. a user computer system B. a processor in a large-scale computer that executes operatingsystem instructions C. a minicomputer that relieves main-frame computersat a ... centre of communications control functions D. preliminary processor ofbatch jobs. E. None of the above

Last Answer : a minicomputer that relieves main-frame computersat a computer centre of communications control functions

Description : Which layers of the OSI determines the interface often system with the user? A) Network B) Application C) Data link D) Session

Last Answer : B) Application

Description : Which one of the following statements is NOT correct about HTTP cookies? a. A cookies is a piece of code that has the potential to compromise the security of an Internet user b. A cookie gains entry ... and time d. Cookies can be used to track the browsing pattern of a user at a particular site

Last Answer : a. A cookies is a piece of code that has the potential to compromise the security of an Internet user

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : Which layer provides the services to user? a.application layer b.session layer c.presentation layer d.physical layer

Last Answer : a.application layer

Description : Which of the following layers of the OSI model is responsible for user interaction? a.Layer 4 b.Layer 5 c.Layer 6 d.Layer 7

Last Answer : d.Layer 7

Description : In OSI model, which of the following layer transforms information from machine format into that understandable by user a. application b. session c. presentation d. physical

Last Answer : c. presentation

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly

Last Answer : a. all UDP packets are treated independently by transport layer

Description : Which one of the following is a version of UDP with congestion control? a. datagram congestion control protocol b. stream control transmission protocol c. structured stream transport d. user congestion control protocol

Last Answer : a. datagram congestion control protocol

Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____

Last Answer : a. all UDP packets are treated independently by transport layer

Description : Bit stuffing refers to a. inserting a 0 in user stream to differentiate it with a flag b. inserting a 0 in flag stream to avoid ambiguity c. appending a nipple to the flag sequence d. appending a nipple to the use data stream

Last Answer : a. inserting a 0 in user stream to differentiate it with a flag

Description : Which layer provides interface between network support layers and user support layers? a. session layer b. data link layer c. transport layer d. network layer

Last Answer : c. transport layer

Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. false, 3. true

Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly

Last Answer : A. all UDP packets are treated independently by transport layer

Description : Radio channels are attractive medium because __________ a) Can penetrate walls b) Connectivity can be given to mobile user c) Can carry signals for long distance d) All of the mentioned

Last Answer : d) All of the mentioned